Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DuckwareV13_prod.dll
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
DuckwareV13_prod.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
DuckwareV13_prod.dll
-
Size
11.7MB
-
MD5
fa21040a53451ceb7cb2e2b661a85444
-
SHA1
68feea38f164f996a234214aa3fdb13bfd6730e3
-
SHA256
72e4c85353d7e86ead026be15d0e07c0747be22aeffb7ce87677991b81752fb4
-
SHA512
992d96bcf5ab1553feff12ea233b9383f50703ff7d24b0ddb212696fb6ec1c0607d6a78feb103bacdee467c4dfc75bab75c616e052d3866522e28b579a5c839a
-
SSDEEP
49152:vw9RVLHT8+0124ugtrAQku+rheDUXu64lfEcYBCRPrtt/PJBbjbv4rfX0TXSgol1:vKeT2cEjFj
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2372 1260 rundll32.exe 85 PID 1260 wrote to memory of 2372 1260 rundll32.exe 85 PID 1260 wrote to memory of 2372 1260 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DuckwareV13_prod.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DuckwareV13_prod.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2372
-